Please turn on your JavaScript for this page to function normally.
Trojan
Operation targets users of remote access trojans across Europe

In December, Europol and a number of law enforcement and judicial authorities across Europe carried out a two weeks long coordinated action against the use of remote access …

Steam
New Steam escrow system drives impatient users to fake trading sites serving malware

On Wednesday, Valve introduced a new “trade hold” system that should prevent scammers from stealing items from Steam users’ hijacked account, or at least …

Business email compromise scams still happening, still successful

Despite repeated warnings issued by law enforcement, information sharing organizations, and security companies, Business Email Compromise (BEC) scams still abound and the …

Exploring the North American cybercriminal underground

Unlike counterparts in other countries, the North American underground encourages cybercriminal activity amongst novices and seasoned pros alike, according to Trend Micro.“The …

Global cyberconflicts, hacktivism and disruptions are on the horizon

As the data breach landscape continues to evolve, companies must try to stay ahead of the curve and be prepared to respond to any type of security incident. To provide a …

How UK businesses plan to tackle security threats in 2016

81% UK IT decision makers experienced some sort of data or cyber security breach in their organisation in 2015, according to training company QA. 66 per cent said that the …

GPS faker software broadcasts spam across thousands of fake profiles

Different from traditional email spam, social spam can reach a large audience by nature of the platform and can appear trustworthy since it is coming from people in your …

Four ways an attacker can infiltrate an organization by diverting security solutions

Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …

ModPOS: The most sophisticated POS malware to date

Elements of ModPOS date back as far as early 2012. It targeted US retailers in late 2013 and throughout 2014, and is expected to continue to do so in the future. According to …

Two arrested for helping malware developers evade AV software

Two suspects have been arrested on suspicion of operating a website offering services to help criminals overcome and avoid anti malware software, following a joint …

Most consumers concerned about becoming victims of online crime

Globally, 62 percent of consumers believe it’s more likely their credit card information will be stolen online compared to only 38 percent who think it’s more likely they will …

Man stole special agent’s identity, executed a complex identity theft scheme

Rohit Jawa, 25, formerly of Cincinnati, Ohio, pleaded guilty to an indictment charging him with eight counts of wire fraud and one count of aggravated identity theft.Based on …

Don't miss

Cybersecurity news